Staff Portal
Sufyan Taih Faraj Al-Janabi (Professor)

PhD in Network Security

Information Systems - Computer Sciences and IT
sufyan.aljanabi@uoanbar.edu.iq


Biography

  Prof. Dr. Sufyan T. Faraj Al-Janabi was born in Haditha, Iraq (1971). He obtained his B.Sc. (1992), M.Sc. (1995), and Ph.D. (1999) in Electronic and Communications Engineering from the College of Engineering, Nahrain University in Baghdad. He was started as a faculty member in the Computer Engineering Dept., the University of Baghdad in 1999. Then he became the head of that department in 2001. During May 2004- June 2006 he was the Dean of College of Information Technology, Nahrain University. He became the Dean of College of Computer, University of Anbar, Ramadi from July 2006 to May 2010. Prof. (Faraj) Al-Janabi is the winner of the 1st Award for the Best Research Paper in Information Security from the Association of Arab Universities (AARU), Jordan, 2003. He is also the winner of the ISEP fellowship 2009 and the Fulbright fellowship 2010, USA. He is a member of ACM, ASEE, IACR, and IEEE. More information can be found on the personal website link at https://sites.google.com/view/sufyan-aljanabi

Research Interests: Internet protocols, information security, and quantum cryptography.

 

Publication

 

Patents:

  • Development of Optical Network Models for Quantum Cryptography; Iraqi Patent No.3009, 9/12/2001. LINK

 

Books:

  • INTELLIGENT TECHNIQUES AND CONSTRUCTIVE APPROACHES IN COMPUTING AND INFORMATION TECHNOLOGY, Special Issue (Ed.), Int. J. Reasoning-based Intelligent Systems, Vol. 4, No. 4, 2012, Inderscience Enterprises Ltd. LINK
  • QUANTUM CRYPTOGRAPHIC KEY DISTRIBUTION IN OPTICAL NETWORKS, Lambert Academic Publishing (LAP), OmniScriptum GmbH & Co. KG, Germany, 2016, ISBN 978-3-330-00474-0. LINK

 

Book Chapters:

  • OPTICAL NETWORK MODELS FOR QUANTUM CRYPTOGRAPHY, in “Security in the Information Society”, IFIP Advances in Information and Communication Technology, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, and Heba K. Aslan, Eds., Springer-Verlag US,  Volume 86, 2002, pp 435-451, ISBN 978-0-387-35586-3. LINK
  • QUANTUM KEY DISTRIBUTION NETWORKS, in "Multidisciplinary Perspectives in Cryptology and Information Security", Sattar Sadkhan and Nidaa Abbas, Eds., IGI Global, 2014, ISBN13: 9781466658080; ISBN10: 1466658088; EISBN13: 9781466658097. LINK

 

Publication:

  1. Noor Hamad Abid and Sufyan Al-Janabi, The Secure I-Voting System Helios++; International Journal of Computing and Digital Systems, University of Bahrain, 2020 (Accepted). LINK
  2. Sameer Al-Janabi, Sufyan Al-Janabi, and Belal Al-Khateeb, Image Classification using Convolution Neural Network-Based Hash Encoding and Particle Swarm Optimization; International Scientific Conference of the University of Babylon (ISCUB-2019), Babylon, Iraq, 1-2 December 2019 (Accepted). LINK
  3. Ali Azzawi, Sufyan Al-Janabi, and Belal Al-Khateeb, Hybrid Intrusion Detection System Based on Deep Learning; International Scientific Conference of the University of Babylon (ISCUB-2019), Babylon, Iraq, 1-2 December 2019 (Accepted). LINK
  4. Wael Ali Hussien and Sufyan Al-Janabi, Using DSDM for Developing Graduate Study Based Cryptanalysis Projects; i-manager’s Journal on Communication Engineering and Systems, 2020 (Accepted). LINK
  5. Ahmed J. Abd and Sufyan Al-Janabi, Classification and Identification of Classical Cipher Type Using Artificial Neural Networks, Journal of Engineering and Applied Sciences, Vol. 14, No. 11, pp. 3549-3556, 2019. DOI: 10.3923/jeasci.2019.3549.3556. LINK
  6. Ali Azzawi, Sufyan Al-Janabi, and Belal Al-Khateeb, Survey on Intrusion Detection Systems based on Deep Learning; Periodicals of Engineering and Natural Sciences, ISSN 2303-4521, Vol. 7, No. 3, September 2019, pp.1074-1095, DOI: http://dx.doi.org/10.21533/pen.v7i3.635. LINK
  7. Amjad Shehab and Sufyan Al-Janabi, Edge Computing: Review and Future Directions; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 368-380. / DOI: 10.4206/aus.2019.n26.2.45. LINK 
  8. Sufyan Al-Janabi and Noor Hamad Abid, Security of Internet Voting Schemes: A Survey; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 260-270. / DOI: 10.4206/aus.2019.n26.2.33. LINK
  9. Noor Hamad Abid and Sufyan Al-Janabi, A Framework for I-Voting based on Helios and Public-Key Certificates; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 234-243. / DOI: 10.4206/aus.2019.n26.2.30. LINK
  10. Sameer Al-Janabi, Sufyan Al-Janabi, and Belal Al-Khateeb, Image Retrieval using Neural Network based Hash Encoding: A Survey; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 396-409. / DOI: 10.4206/aus.2019.n26.2.48/. LINK
  11. Sufyan Al-Janabi, Belal Al-Khateeb, and Ahmed J. Abd, Intelligent Techniques in Cryptanalysis: Review and Future Directions, UHD Journal of Science and Technology, University of Human Development (UHD), Sulaimaniya, KRG- Iraq, Vol.1, No.1, pp. 1-9, 2017, DOI: 10.21928/uhdjst.v1n1y2017.pp1-10. LINK
  12. Dana Kareem Ghareeb and Sufyan Al-Janabi, Real-Life Enhancement of QoE for Social Network Applications, Annual Conference on New Trends in Information & Communications Technology Applications (NTICT 2017), Baghdad, 7-9 March 2017 pp. 63-68 (978-1-5386-2962-8/17/$31.00 ©2017 IEEE 63). LINK
  13. Ali Jamal, Belal Al-Khateeb, and Sufyan Al-Janabi, Query Reformulation Using WordNet and Genetic Algorithm; Annual Conference on New Trends in Information & Communications Technology Applications (NTICT 2017), Baghdad, 7-9 March 2017, pp. 91-96 (978-1-5386-2962-8/17/$31.00 ©2017 IEEE 91). LINK
  14. Sufyan Al-Janabi, On the Necessity of Establishing a National Cybersecurity Testbed, Journal of University of Human Development, Vol.2, No.4, Dec. 2016, pp. 428-436. LINK
  15. Sufyan Al-Janabi and Wael Ali Hussien, Architectural Design of General Cryptanalysis Platform for Pedagogical Purposes, i-manager’s Journal on Software Engineering, Vol. 11, No. 1, July - September 2016, pp.1-12, DOI: https://doi.org/10.26634/jse.11.1.8189. LINK
  16. Sufyan Al-Janabi, Towards a Framework for Supporting Unconditionally-Secure Authentication Services within E-Government Infrastructures, Journal of University of Human Development, Vol.2, No.3. August 2016 /pp490-497.
    http://dx.doi.org/10.21928/juhd.20160203.24. LINK
  17. Sufyan Al-Janabi and Dana Kareem Ghareeb, Proposed Approach for Enhancement of QoE to Support e-Society, Journal of University of Human Development, Vol.2, No.3. August 2016 /pp534-541. LINK
  18. Ali Jamal, Belal Al-Khateeb, and Sufyan Al-Janabi, Web Search Enhancement Using WordNet Query Expansion Technique, Journal of University of Human Development, Vol.2, No.3. August 2016 /pp542-547. LINK
  19. Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali, An Enhanced Algorithm for Hiding Sensitive Association Rules Based on ISL and DSR Algorithms, International Journal of Computing and Network Technology (IJCNT), University of Bahrain, Bahrain, No. 3, Vol.3, Sept. 2015, DOI: http://dx.doi.org/10.12785/IJCNT/030301. LINK
  20. Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali, Hiding Association Rules over Privacy-Preserving Distributed Data Mining; Kirkuk University Journal- Scientific Studies, Vol. 9, No.1, 2014, pp. 59-72. LINK
  21. Sufyan Al-Janabi, Ali Jubair Dawood, and Abeer D. Salman, Enhancing the Security and Privacy of WBAN-Based Distributed Storage Systems;  Journal of UHD Journal, Vol.1, No.2, pp. 288-294, 2015 (Papers of the 1st  Scientific Conference of the University of Human Development, Sulaimaniya, Iraq, 1-2 April 2014). LINK
  22. Sufyan Al-Janabi, Ali Jubair Dawood, and Ekram H. Hassan, Development and Simulation of Enhanced Key Management Scheme for WBANs; Journal of UHD, Vol.1, No.2, pp. 280-287, April 2015 (Papers of the 1st  Scientific Conference of the University of Human Development, Sulaimaniya, Iraq, 1-2 April 2014). LINK
  23. Foad S. Mubarek, Sufyan Al-Janabi, and Kashif Kifayat, Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol; the 6th International Conference on Developments in e-Systems Engineering (DeSE2013), Abu Dhabi, UAE, 16-18 Dec. 2013. LINK
  24. Sufyan Al-Janabi, Ali Jubair Dawood, and Ikram H. Hasan, Biometric-Based Authentication and Key Management Scheme for WBANs; i-manager's Journal on Information Technology (JIT), Vol. 2, No. 2, March-May, 2013, pp. 23-31, DOI: https://doi.org/10.26634/jit.2.2.2286. LINK
  25. Sufyan Al-Janabi, Waleed Kareem Awad, and Kashif Kifayat, Trusted E-Contracts in Collaborative Intra-Cloud Business-to-Business Environments; i-manager’s Journal on Communication Engineering and Systems (JCS), Vol. 2, No. 3, May – July, 2013, pp. 1-12, https://doi.org/10.26634/jcs.2.3.2331. LINK
  26. Sufyan Al-Janabi, Ali Jubair Dawood, and Abeer D. Salman, Distributed Data Security and Privacy in WBAN-Related e-Health Systems; AL-Mansour Journal, No.20, pp. 121-132, 2013 (Special Issue of the Proceeding of The 12th Scientific Conference of Al-Mansour University College, Baghdad, Iraq, 4-5 May 2013). LINK
  27. Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali, Hiding Sensitive Frequent Itemsets over Privacy-Preserving Distributed Data Mining; Rafidain J. of Comp. & Maths. (Special Issue of the 5th Scientific Conference on Information Technology, Dec. 19-20, 2012), Vol. 10, No. 1, pp. 91-105, University of Mosul, Iraq, 2013. LINK
  28. Sufyan Al-Janabi, Sameeh Jasim, and Kashif Kifayat, Mediated IBC-Based Management System of Identity and Access in Cloud Computing, The 3rd Engineering Conference, College of Engineering, Tikrit University, 11-12 December 2012 (Appeared in Tikrit Journal of Engineering Sciences, Vol. 20, No. 3, pp.75-86, 2013). LINK
  29. Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali, Privacy-Preserving Distributed Knowledge Discovery: Survey and Future Directions; Special Issue: Intelligent Techniques and Constructive Approaches in Computing and Information Technology, Sufyan Al-Janabi and Jawad Ali, Eds., Inderscience Enterprises Ltd, Int. J. Reasoning-based Intelligent Systems, Vol. 4, No. 4, 2012, pp. 235-244. LINK
  30. Sufyan Al-Janabi, Mohammed I. Salman, and Omar Abul Maati, Message Ferrying-Ad Hoc On-Demand Distance Vector (MF-AODV) Protocol, The 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET 2012), 25th and 26th June 2012, Liverpool, UK, pp. 328-333. LINK
  31. Sufyan Al-Janabi, Yaseen S. Yaseen,  and Bob Askwith, The Bus Ad hoc On-demand Distance Vector (BAODV) Routing Protocol; The 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET 2012), 25th and 26th June 2012, Liverpool, UK, pp. 7-12. LINK
  32. Sufyan Al-Janabi and Hussien Khalid Abdul-Razzaq, Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography; i-manager's Journal on Software Engineering (JSE), Vol. 6, No. 3, pp. 1-12, January-March 2012, DOI: https://doi.org/10.26634/jse.6.3.1786. LINK
  33. Sufyan Al-Janabi and Amer Kais Obaid, Development of Certificate Authority Services for Web Applications; Proceedings of the First International Conference on Future Communication Networks (ICFCN ’2012), pp. 135-140, Baghdad, Iraq, 10-12 April 2012 (IEEE Xplore). LINK
  34. Sufyan Al-Janabi, Sameeh Jasim, and Kashif Kifayat, Management of Identity and Access in the Cloud; Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012 (Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 22-33). LINK
  35. Sufyan Al-Janabi, Waleed Kareem Awad, and Kashif Kifayat, Trusted Cloud Computing; Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012 (Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 6-13). LINK
  36. Foad Mubarek and Sufyan Al-Janabi, Key Management Scheme for Mobile Wireless Sensor Networks; Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012(Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 58-64). LINK
  37. Sufyan Al-Janabi and Yaseen S. Yaseen, Performance Evaluation of AODV and DSDV Routing Protocols Using CityMob in VANETs, i-manager's Journal on Communication Engineering and Systems (JCS), Vol. 1, No. 1, pp. 1-10, November 2011 - January 2012, https://doi.org/10.26634/jcs.1.1.1726. LINK
  38. Sufyan Al-Janabi and David Anderson, Reforming the Higher Education System in Iraq: Internationalization via Decentralization, i-manager's Journal of Educational Technology, Volume 8, No. 3, pp. 1-14, October – December Issue, 2011, DOI: https://doi.org/10.26634/jet.8.3.1634. LINK
  39. Sufyan Al-Janabi and Ali Shuaib, Simulation Study of Wired/Wireless Fieldbus Systems Using Store and Forward Mode, Engineering and Technology Journal, University of Technology, Baghdad, Vo1. 29, No. 16, pp. 3271-3290, 2011. LINK
  40. Sufyan Al-Janabi and Ali Makki Sagheer, Enhancement of E-Government Security Based on Quantum Cryptography, Proceedings of the International Arab Conference on Information Technology (ACIT'2011), Naif Arab University for Security Science (NAUSS), Riyadh, Saudi Arabia, 11-14 December 2011. LINK
  41. Sufyan Al-Janabi and Mayada Rasheed, Public-Key Cryptography Enabled Kerberos Authentication, Proceedings of theFourth International Conference on Developments in eSystems Engineering (DeSE ’2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 209-214 (IEEE Xplore). LINK
  42. Sufyan Al-Janabi and Hadeel Amjad Saed, A Neural Network-Based Anomaly Intrusion Detection System; Proceedings of the Fourth International Conference on Developments in eSystems Engineering (DeSE ’2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 221-226 (IEEE Xplore). LINK
  43. Sufyan Al-Janabi, Khalida Shaaban Rijab, and Ali Makki, Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher, Proceedings of the Fourth International Conference on Developments in eSystems Engineering (DeSE ’2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 413-418 (IEEE Xplore). LINK
  44. Sufyan Al-Janabi and Ruqaya Rabee Hashim, Key Reconciliation Techniques in Quantum Key Distribution, Proceedings of the First Engineering Conference of the College of Engineering, University of Anbar, Ramadi, Iraq, 20-21 November 2011.
  45. Sufyan Al-Janabi and Neema Enad, Development of an Anti-Censorship System, Proceedings of the First Engineering Conference of the College of Engineering, University of Anbar, Ramadi, Iraq, 20-21 November 2011.
  46. Sufyan Al-Janabi and Muayad S. Kod, On the Development of NDIS Intermediate Driver-Based Virtual Private Networks, Proceedings of the Third International Scientific Conference of Salahaddin University-Erbil, 18-20 October 2011.
  47. Sufyan Al-Janabi and Saif Bassam, Proxy-Based Internet Gateways, Proceedings of the Second Scientific Conference on Applied Scientific Research, Babylon University, Babylon, Iraq, 30-31 May 2011.
  48. Sufyan Al-Janabi and Zainab Ali, Development of Secure e-Payment System, Proceedings of the Second Scientific Conference on Applied Scientific Research, Babylon University, Babylon, Iraq, 30-31 May 2011.
  49. Sufyan Al-Janabi, A Framework for Management of Water Resources Based on Internet-Enabled Wireless Sensor Networks, University of Anbar Symposium on Water Resources, Ramadi, 22-23 March 2011.
  50. Sufyan Al-Janabi and Hussien Khalid Abdul-Razzaq, Combining Mediated and Identity-Based Cryptography for Securing E-Mail; The International Conference on Digital Enterprise and Information Systems (DEIS2011), London Metropolitan Business School, pp. 1-15, UK, July 20-22, 2011 (Springer). LINK
  51. Sufyan Al-Janabi and Omer K. Jasim, Reducing the Authentication Cost in Quantum Cryptography; The 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2011), pp. 363-368, 27th?28th June 2011, Liverpool, UK. LINK
  52. Sufyan Al-Janabi, Nahrainfish: A Green Cryptographic Block Cipher; The First Saudi International Electronics, Communications and Electronics Conference (SIECPC'11), April 23-26, 2011 in Riyadh, Saudi Arabia (IEEE Xplore). LINK
  53. Sufyan Al-Janabi and Joseph E. Urban, Strategic Plan for Enhancing Higher Education Computing Degree Programs in Iraq; IEEE EDUCON Education Engineering, pp. 86-90, April 4 - 6, 2011, Amman, Jordan (IEEE Xplore). LINK
  54. Sufyan Al-Janabi and William Sverdlik, Towards Long-Term International Collaboration in Computer Science Education; IEEE EDUCON Education Engineering, pp. 94-100, April 4 - 6, 2011, Amman, Jordan (IEEE Xplore). LINK
  55. Sufyan Al-Janabi, Omar A. Athab, and Kasim M. Al-Aubidy, Windows-Based Active-Router Architecture, Journal of University of Anbar for Pure Science, Vol.4, No.3, pp.112-119, 2010. LINK
  56. Sufyan Al-Janabi, Integrating Quantum Cryptography into SSL; Ubiquitous Computing and Communication Journal, Vol. 5, Special Issue of Ubiquitous Computing Security Systems, pp. 1778-1788, 2010.
  57. Sufyan Al-Janabi and David Anderson, Balancing Centralization and Decentralization in Iraqi Higher Education; Proceedings of the Midwest Regional Comparative and International Society Conference, MI, USA, October 29-30, 2010.  
  58. William Sverdlik and Sufyan Al-Janabi, Enhancement of Student Programming Skills Using Distributed Collaborative Programming; Proceedings of the Midwest Regional Comparative and International Society Conference, MI, USA, October 29-30, 2010.
  59. Sufyan Al-Janabi, Omar A. Athab, and Kasim M. Al-Aubidy, Windows-based Active-Router Design and Evaluation; Proceedings of the 6th International Multi-Conference on Systems, Signals and Devices (SSD’09), Vol. III, Tunisia March 23-26, 2009 (IEEE Xplore). LINK
  60. Saad Al-Tak and Sufyan Al-Janabi, Hybrid Wired/Wireless Profibus Timing Analysis Under Transient Faults; i-Manager's Journal on Software Engineering, (July-Sep., 2008): 12-22, DOI: https://doi.org/10.26634/jse.3.1.296. LINK
  61. Sufyan Al-Janabi, A Novel Extension of SSL/TLS Based on Quantum Key Distribution; Proceedings of the International Conference on Computer and Communication Engineering 2008 (ICCCE08), VOLUME I, pp. 919-922, Malaysia, May 13-15, 2008 (IEEE Xplore). LINK
  62. Sufyan Al-Janabi, Nidhal Ezzat, and Sinan Ghassan, Investigation of Java Smart Card Technology for Multi-Task Applications; (The First Scientific Conference of College of Computer, University of Anbar - CCIT2008), Journal of University of Anbar for Pure Science, Vol. 2, No. 1, pp. 12-23, 2008. LINK
  63. Sufyan Al-Janabi, Towards a Strategy for the Sustainable Development of IT Section in A-Anbar Province; Symposium of Sustainable Development of Al-Anbar, University of Anbar, Ramadi, Iraq, March 2008.  
  64. Sufyan Al-Janabi, A New Block Cipher (Nahrainfish) Based on Some AES Finalists; Journal of University of Anbar for Pure Science, Vol. 1, No. 2, pp. 111-125, 2007. LINK
  65. Saad Al-Tak and Sufyan Al-Janabi, PROFIBUS Timing Analysis Under Transient Faults; Asian Journal of Information Technology, Medwell Online, Vol.6, No.7, pp. 806-816, 2007. LINK
  66. Saad Al-Tak and Sufyan Al-Janabi, Inaccessibility in PROFIBUS due to transient faults; Proceedings of the International Arab Conference on Information Technology (ACIT' 2007), Syria, 26-28 November 2007. LINK
  67. Sufyan Al-Janabi and Media A. Ali, Design and Implementation of SET-Enabled E-Commerce System; Journal of Engineering and Sustainable Development, Al-Mustansiriya University, Vol. 12, No. 2, pp. 31-49, 2008 (A preliminary version of it appeared in the proceedings of the 3rd International Conference on Information Technology (ICIT' 2007), Al-Zaytoonah University, Jordan, May 9-11, 2007). LINK
  68. Sufyan Al-Janabi, Unconditionally Secure Authentication in Quantum Key Distribution; Iraqi Journal of Computers, Communication, Control, and Systems Engineering, Vol. 6, No. 3, pp. 47-63, 2006 (A preliminary version under the title Defeating a man-in-the-middle attack in quantum key distribution appeared in the Proceedings of the 5th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP’06), Patras, Greece, 2006). LINK
  69. Sufyan Al-Janabi, General Two-Party Oblivious Circuit Evaluation; Proceedings of the 18th International Conference on Microelectronics (ICM 2006), pp. 210-213, KFUPM, Dhahran, KSA, 16-19 December 2006 (IEEE Xplore). LINK
  70. Sufyan Al-Janabi, Towards Arab Scientific Collaboration in the Field of Quantum Cryptography; Proceedings of the 4th Symposium on Scientific Research and Technological Development Outlook in the Arab World, Damascus, Syria, 11-14 December 2006.
  71. Sufyan Al-Janabi and Firas Rasmi, Design and Implementation of a Transparent Secure LAN; Journal of Engineering, University of Baghdad, Vol. 12, No. 4, pp. 1063 - 1076, 2006 (A preliminary version appeared in the Proceedings of the 3rd Symposium on Scientific Research and Technological Development Outlook in the Arab World, Riyadh, KSA, April 2004). LINK
  72. Sufyan Al-Janabi and Mohammed Tariq, Secure E-Mail System Using S/MIME and IB-PKC; Engineering and Technology Journal, University of Technology, Vol. 25, No. 4, pp. 646-668, 2007 (A preliminary version appeared in the Proceeding of the 6th International Philadelphia Engineering Conference (IPEC 2006), Amman, Jordan, 19-21 Sept. 2006, pp. 713-722. LINK
  73. Mohammed Tawfiq, and Sufyan Al-Janabi, and Abdul-Kareem Kadhim, Key Exchange Protocol Supporting Mobility and Multihoming; Anbar Journal of Engineering Sciences, Vol. 1, No. 1, pp.11-30, 2007. LINK
  74. Sufyan Al-Janabi, A Novel Quantum Cryptographic Error Elimination Technique Using Simple Hamming Codes; Proceedings of the International Conference on Advanced Remote Sensing for Earth Observation Systems, KACST and ISPRS, Riyadh, KSA, May 2005 (A preliminary version of it appeared in the Journal of Engineering, College of Engineering, University of Baghdad, No. 2, Vol. 8, Iraq, June 2002.
  75. Sufyan Al-Janabi, Toward Commercial Applications of Quantum Cryptography in Arab Countries; Proceedings of the International Conference on Advanced Remote Sensing for Earth Observation Systems, KACST and ISPRS, Riyadh, KSA, May 2005.
  76. Sufyan Al-Janabi, Building Cryptographic Primitives Based on Single–Channel Quantum Cryptography; Journal of Engineering and Development, College of Engineering, Al-Mustansiriya University, Vol. 6, No. 5, Baghdad, Iraq, December 2002.
  77. Sufyan Al-Janabi, Two-Party Oblivious Circuit Evaluation; Proceedings of the 3rd National Conference on CCCSE, Baghdad, Iraq, December 2002.
  78. Saleem Taha, Sufyan Al-Janabi, and Mostafa Abdul-Jabbar, Protocol Conversion Between ADLP80 and IEC870 Communication Protocol Standards using Formal Methods; Journal of Engineering, College of Engineering, University of Baghdad, No. 3, Vol. 8, Iraq, September 2002.
  79. Sufyan Al-Janabi, Fawzi Al-Naima, and Siddeeq Ameen, Quantum Cryptographic Key Distribution in Multiple-Access Networks; Proceeding of 16th IFIP World Computer Congress, Vol. I, pp. 42-49, China, August 2000 (IEEE Xplore). LINK
  80. Sufyan Al-Janabi, Fawzi Al-Naima, and Siddeeq Ameen, Error Elimination and Privacy Amplification in Single-Channel Quantum Cryptography; Proceeding of 2nd National Conference on Data and Computer Security, Baghdad, Iraq, February 2000.
  81. Sufyan Al-Janabi, Fawzi Al-Naima, and Siddeeq Ameen, Simulation of a Quantum Cryptographic Protocol; Proceedings of Al-Hadba’ Conference on Informatics and Software Engineering, Mosul, Iraq, April 2000.
  82. Sufyan Al-Janabi, Fawzi Al-Naima, and Siddeeq Ameen, Quantum Cryptography: A New Dimension in Optical Network Security; Proceedings of 9th National Computer Center Conference, Baghdad, Iraq, December 1999 (An extended version appeared in the Journal of Computers, National Computer Center, Iraq, 2000).  
  1. Sufyan Al-Janabi, Fawzi Al-Naima, and Siddeeq Ameen, Development of New Secure Optical Network Models Based on Quantum Cryptography; Proceedings of the Federation of Arab Scientific Research Councils Conference on Super-Highway Networks, Algeria, September 1999 (An extended version appeared in FASRC Journal- Selected Research Papers, No. 1, pp. 1-15, 2001).
  2. Majid Al-Taee, Sufyan Al-Janabi, and Kadir Al-Shara, Microprocessor Controlled Voltage Regulator for Space-Based Power Systems; Journal of Nahrain University: Engineering, Vol.2, No.2, pp. 1-12, Baghdad, Iraq, October 1998 (A preliminary version appeared in the Proceeding of 6th International Conference on Computer Systems and Applications, CSS and IEEE, Egypt, 1996).

 

 

  

Lectures


No. Subjects Lectures Stage File Video
1 Security Introduction about security Fourth
2 Security Information Security Models Fourth
3 Security Classical Encryption Techniques I Fourth
4 Security Statistical Attacks Fourth
5 Security Classical Encryption Techniques II Fourth
6 Security Polyalphabetic Ciphers Fourth
7 Security Block Ciphers Fourth
8 Security The Data Encryption Standard Fourth
9 Security Group Theory Fourth
10 Security Rings and Fields Fourth
11 Security Modular Arithmetic Fourth
12 Security Prime Finite Fields Fourth
13 Security Using Block Ciphers in Real-Word Systems Fourth
14 Security Modes of Operation Fourth
15 Security Public-Key Cryptography Concepts Fourth
16 Security RSA System and RSA Security Fourth
17 Security Access Control I: Authentication Fourth
18 Security Dictionary Attacks Fourth
19 Security Access Control II: Authorization Fourth
20 Security CAPTCHA Fourth
21 Security Malware: Viruses and Worms Fourth
22 Security Simple Virus Example Fourth
23 Security Stream Ciphers Fourth
24 Security The RC4 Cipher Fourth
25 Security Polynomial Arithmetic Fourth
26 Security Polynomials over GF(2) Fourth
27 Security Finite Fields of the form 2^n Fourth
28 Security Arithmetic in GF(2^n) Fourth
29 Security The Advanced Encryption Standard I Fourth
30 Security The Advanced Encryption Standard II Fourth
31 Security Public-Key Cryptography for Exchanging Secret Sess Fourth
32 Security Hashing for Message Authentication Fourth
33 Information Systems Security I & II References Fourth

Other

 

Awards & Fellowships:

  1. The RIPE Academic Cooperation Initiative (RACI) Fellowship for the Middle East Network Operators Group (MENOG 17), Muscat, Oman, April 2017.
  2. Research Fellowship, Liverpool John Moores University, UK, 2012.
  3. DELHPE-Iraq Visiting Scholar Fellowship 2011.
  4. Fulbright Visiting Scholar Program (FVSP) Fellowship 2010.
  5. Iraq Scientist Engagement Program (ISEP) Fellowship 2009.
  6. Winner of the 1st and 2nd Awards for the Best Research Paper in Information Security from the Association of Arab Universities (AARU), Jordan, 2003.

 

Memberships:

  1. Iraqi Engineers Union (IEU) - Consultant Engineer.
  2. Member of  IEEE - Communications, Computer, and Information Theory Societies.
  3. Association for Computing Machinery (ACM)
  4. American Society for Engineering Education (ASEE)
  5. International Association for Cryptologic Research (IACR)
  6. Intel Academic Community (Intel.com)
  7. Arab Computer Society (ACS)
  8. Member of the Internet Society (https://www.internetsociety.org)

 

Conference Chairing:

  1. TPC Chair, The 3rd International Conference on Computing, Communications, and Information technology, University of Anbar, Ramadi, Iraq, 24-25 April 2019.
  2. TPC Chair, College of Science and Technology, University of Human Development 4th International Conference, Sulaimaniyah, KRG- Iraq, 9-10 April 2017.
  3. TPC Chair, College of Science and Technology, University of Human Development 3rd International Joint Conference, Sulaimaniyah, KRG- Iraq, 6-7 April 2016.
  4. TPC Chair, UHD 2nd International Conference on Computing and Information Technology 2015 (UHDComp’15), Sulaimaniyah, KRG- Iraq, 1-2 April 2015.
  5. Chairman of the Scientific Committee, The 2nd Scientific Conference of College of Computers (CCIT 2012), University of Anbar, Ramadi, Iraq, 27-28 March 2012.
  6. General Chairman, The 1st Scientific Conference of College of Computers, University of Anbar, Ramadi, 14-15 April 2008.

 

Membership of Committees in Conferences and Workshops (Sample):

  1. TPC member of the International Conference on Intelligent Transportation Systems Telecommunications (ITST) Series (2012- 2018).
  2. TPC member of the International Conference on Computer Applications & Information Security (ICCAIS) Series, Riyadh, Saudi Arabia (2018- 2020)
  3. TPC member of the 21st National Computer Conference (NCC’2018), Riyadh, Saudi Arabia, April 25-26, 2018.
  4. TPC member of the International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR) Series (2018 – 2020).
  5. TPC member of the 1st Conference on Internet of Things and Embedded Intelligence (CITEI 2020), Yogyakarta, Indonesia, 29-30 July 2020.
  6. Member of the International Advisory Board: The First International Conference on Agriculture and IT/IoT/ICT (ICAIT2019), October 2019, Wuhan, Hubei, China.
  7. Member of the Advisory Committee, I-manager’s International Conference on Engineering and Technologies (IICET 2015), India, 10-11 April 2015.
  8. TPC Member of 2015 Global Summit on Computer & Information Technology (GSCIT' 2015), 11-13 June, Sousse, Tunisia.
  9. TPC member of the International Conference on Developments in e-Systems Engineering (DeSE) Series (2012- 2013).
  10. TPC member of the International Conference on Connected Vehicles & Expo (IEEE ICCVE) Series (2012- 2019).
  11. TPC member of the IIAI International Conference on e-Services and Knowledge Management (ESKM) Series (2012- 2013), Japan.
  12. Member of Technical Committee, International Arab Conference on Information Technology (ACIT) Series (2007-2012).
  13. Member of TPC, First International Conference on Future Communication Networks (ICFCN ’2012), Baghdad, Iraq, April 2012.
  14. Member of the Steering Committee of The 1st Workshop of Arab IT Experts, FARC, Damascus, Syria, 5-8 April 2005.
  15. Member of the Organization Committee of The 3rd National Conference on Computer, Communication, Control, and Systems Engineering (CCCSE), Baghdad, 18-19 December 2002.

 

Journals’ Editorial:

  1. Editor-in-Chief: i-manager’s Journal on Communication Engineering and Systems (March 2017- up to date).
  2. Member of Advisory Board of UHD Journal of Science and Technology, DOI: 10.21928/issn.2521-4217 (Since 2017).
  3. Member of the Advisory Board of the Iraqi Journal on Electrical and Electronic Engineering, Basrah University, Iraq, since 2015. 
  4. Member of the Editorial Board of i-manager’s Journal on Cloud Computing (JCC), since 2014. 
  5. Member of the Editorial Board of The International Arab Journal of Information Technology (IAJIT), CCIS, Amman, Jordan [2007-2013].
  6. Member of the Editorial Board of i-manager's Journal on Software Engineering (JSE), India, since 2008.
  7. Member of the Editorial Board of the International Journal of Reasoning-based Intelligent Systems (IJRIS), Inderscience Publishers, Switzerland, since 2012.
  8. Member of the Editorial Board of i-manager's Journal on Communication Engineering Systems (JCS), India [2011-2016].
  9. Member of the Scientific Committee of the Journal of University of Anbar for Pure Science, since 2009 up to date.
  10. Member of the Scientific Committee of the Journal of University of Anbar for Engineering, since 2010 up to date.
  11. Active reviewer and consultant for a number of international (including some Springer Journals) and national scientific journals.

 

Graduate Students Supervision:

 

 

University

Study and Year

 

Thesis Title

 

Student Name

 

Anbar

M.Sc. 2019

Electricity-Theft Detection in Smart Grids based on Deep Learning

Noor Mahmood Ibraheem

  1.  

Anbar

M.Sc. 2019

Secure e-Voting based on Quantum Cryptography

 

Ibrahim Saud khalil

 

  1.  

Anbar

M.Sc. 2018

Intrusion Detection System based on Deep Learning

Ali Azzawi Abdul-Lateef

  1.  

Anbar

M.Sc. 2018

Design and Implementation of I-Voting System

Noor Hamad Abed

  1.  

Anbar

M.Sc. 2018

Neural Network based Hash Coding

Sameer Ismail Ali

  1.  

Anbar

M.Sc. 2017

Development of Enhanced Modules for Edge Computing in Heterogeneous Environment

Amjad Hameed Shehab

  1.  

Anbar

M.Sc. 2016

Development of Automated Cryptanalysis Tool for Classical Ciphers

Ahmed Jumaa Abed

  1.  

Sulaimaniya

M.Sc. 2016

Enhancing QoS and QoE for National ISPs Services in Responding to New User Demands

Dana Kareem Hama

  1.  

Anbar

M.Sc. 2015

Using Software Engineering Techniques for the Design and Implementation of Cryptanalysis Platform

Wael Ali Hussien

  1.  

Anbar

M.Sc. 2014

Towards an Intelligent Search Engine

Ali Jamal Hilal

  1.  

Anbar

M.Sc. 2013

Biometric-Based Authentication and Key Management in WBANs for m-Health

Ekram Habeeb Hussan

  1.  

Anbar

M.Sc. 2013

Distributed Data Security and Privacy in WBAN-Related e-Health Systems

Abeer Dawood Salman

  1.  

Anbar

M.Sc. 2012

Identity and Access Management in Cloud Computing

Sameeh Abdulghafour Jassim

  1.  

Anbar

M.Sc. 2012

Building Trust in Cloud Computing

Waleed Kareem Awad

  1.  

Sulaimaniya

Ph.D. 2011

Privacy-Preserving Distributed Data Mining

Alaa Khaleel Al-Hadithy

  1.  

Mosul

Ph.D. 2011

Secure Routing and Key Management in Dynamic WSNs

Fouad Saleem Mubarak

  1.  

Anbar

M.Sc. 2011

Enhanced Routing Protocols for VANETs

Yaseen Salim Yaseen

  1.  

Anbar

M.Sc. 2011

Message Ferrying in Clustered MANETs

Mohammed Ibrahim Salman

  1.  

Anbar

M.Sc. 2010

Neural Network-Based Anomaly Intrusion Detection

Hadeel Amjad Sayeed

  1.  

Anbar

M.Sc. 2010

Public-Key Cryptography Enabled Kerberos Authentication

Mayada Abdul-Salam Rasheed

  1.  

Anbar

M.Sc. 2010

Secure E-Mail System Using Mediated and Identity-Based Cryptography

Hussien Khalid Abdul-Razzaq

  1.  

Anbar

M.Sc. 2009

Study and Analysis of the Cost of Unconditional Authentication in QKD

Omer Kareem Jasim

  1.  

Anbar

M.Sc. 2009

Key Reconciliation in Quantum Cryptography

Ruqayah Rabee Hashim

  1.  

Technology (UOT)

M.Sc. 2008

Design and Implementation of Certificate Authority System

Amer Kais

  1.  

Technology (UOT)

M.Sc. 2008

Simulation Study of Wired/Wireless Fieldbus Systems

Ali Shuaib

  1.  

Technology (UOT)

Ph.D. 2007

Design and Implementation of Efficient Video Encryption System

Khalida Shabaan Rijab

  1.  

Baghdad

Ph.D. 2007

Timing Analysis of Hybrid Wired/Wireless PROFIBUS Networks Under Transient Faults

Saad Hazim Al-Tak

  1.  

Baghdad

Ph.D. 2007

Active and Programmable Networking System

Omer Ali Athab

  1.  

Technology (UOT)

M.Sc. 2007

Neural Network-Based Authentication System

Mohammed Athab Mohammed

  1.  

Baghdad

M.Sc. 2007

Covertness and Confidentiality of the Infranet Anti-Censorship System

Nema Enad Kadhum

  1.  

Technology (UOT)

Ph.D. 2006

Security of IP-Based Mobile Access Networks with QoS Support

Mohammed Ali Tawfiq

  1.  

Baghdad

M.Sc. 2006

Design and Implementation of Open Platform Multi-Task Java Card Applets

Sinan Ghassan Abid

  1.  

Baghdad

M.Sc. 2006

Secure E-Mail System Using S/MIME and Identity-Based Cryptography

Mohammed Tariq Ibrahim

  1.  

Baghdad

M.Sc. 2005

Design and Implementation of Windows 2000 Based Firewall System

Alaa Mohammed Abdul-Hadi

  1.  

Nahrain

M.Sc. 2005

Implementing Web Security Using SSL/TLS

Wisam Dhiya Al-Taee

  1.  

Nahrain

M.Sc. 2005

Implementation of Virtual Private Network Using Transport Mode

Muayad Salim Kud

  1.  

Mustansiriya

M.Sc. 2005

Design and Implementation of SET-Enabled E-Commerce System

Media Abdul-Razzaq Ali

  1.  

Baghdad

M.Sc. 2005

Development of Heterogeneous Database Simulation for CAP E-Commerce System

Zainab Hussain

  1.  

Basrah

M.Sc. 2005

Design and Implementation of an Internet Firewall Using the Proxy Technique

Saif-Aldeen Mehdi Al-Bassam

  1.  

Baghdad

M.Sc. 2004

Design and Implementation of a Transparent Secure LAN

Firas Rasmi Barjas

  1.  

Baghdad

M.Sc. 2002

Protocol Conversion between ADLP80 and IEC870 Communication Protocol Standards Using Formal Methods

Mustafa Mohammed Abdul-Jabbar

  1.